NISTRMF (Risk Management Framework)

ForeScout CounterACT® helps you proactively enforce a unified network security policy to address National Institute for Standards and Technology (NIST)RMF requirements in three key ways:

See – Detect IP-addressed endpoints on the network, including unmanaged, IoT and rogue devices, without requiring software agents or previous device knowledge.

Control – Allow, deny or limit network access based on device posture and security policies. Automate security and compliance policy enforcement and reduce the time to identify and resolve incidents while allowing security operations to be more efficient, effective and proactive.

Orchestrate – Share real-time security intelligence across more than 70 network, security, mobility and IT management products* to automate and accelerate system-wide threat response while reducing the risk and costs associated with manual analysis and correlation.

Comply to Connect

CounterACT can provide visibility, hygiene, mitigation and control across technical, management and operational assets in accordance with the U.S. Government’s 800-53 and NIST SP 800-171 standards. CounterACT is the agentless visibility and control solution that:

Gain mission-critical visibility, control and scalability to power ACAS capabilities

Identifies assets present on networks, regardless of whether or not they have generated traffic or are IP-enabled

Discovers un-scanned devices as soon as they connect to networks and triggers in-depth vulnerability scans

Can leverage ACAS vulnerability information to determine the appropriate level of network access or trigger remediation

Also integrates with more than 70 leading network, security and IT management solutions* via ForeScout ControlFabric® Architecture

Command Cyber Readiness Inspections (CCRI)

Comply with CCRI Guidelines

ForeScout offers a policy-based security platform for endpoint compliance automation that can help DoDIT organizations create, monitor and enforce endpoint security policies in accordance with DISASTIGs and CJCSI directives with minimal effort. CounterACT identifies devices that are noncompliant with HBSS or ACAS even when those devices are entirely unknown. CounterACT automates endpoint compliance controls through:

Works with leading wireless/MDM solutions via ForeScout Extended Modules

Internet of Things (IoT)

Gain real-time visibility and control of IP-connected devices

CounterACT helps government IT professionals and those with government contracts to detect, monitor and securely manage devices, including the growing numbers of IoT devices. CounterACT offers the unique ability to:

See IoT devices the instant they connect to government networks, without requiring software agents or prior device knowledge